You are on page 1of 4

Code No: R5410407 1

IV B.Tech I Semester(R05) Regular/Supplementary Examinations, December 2009


OPERATING SYSTEMS
(Common to Electronics & Control Engineering, Bio-Medical Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. What are the major activities of an operating system with regard to memory management? [16]

2. What are the various reasons for process suspension? Explain. [16]

3. Explain Mutual exclusion mechanism with an example. [16]

4. Explain the solution to Dining Philosophers Problem using Monitors. [16]

5. Write a note on:

(a) compaction
(b) External fragmentation
(c) Internal fragmentation
(d) 50- percent rule oh fragmentation [4+4+4+4]

6. Explain Fair-share scheduling policy with an appropriate example. Compare its performance with any
other scheduling policy. [16]

7. (a) Explain hash file organization.


(b) Discuss the address information elements of a file directory. [8+8]

8. (a) Discuss about network worm programs.


(b) Explain statistical anomaly detection, rule- based detection approach to intrusion detection. [8+8]

?????
Code No: R5410407 2
IV B.Tech I Semester(R05) Regular/Supplementary Examinations, December 2009
OPERATING SYSTEMS
(Common to Electronics & Control Engineering, Bio-Medical Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. Explain about the various memories hierarchy. [16]

2. What are various steps involved in creating a process? Discuss in detial? [16]

3. Explain the following implementations of semaphores:

(a) Testset instruction


(b) Interrupts [8+8]

4. Explain about Deadlock Avoidance. [16]

5. Give shorts notes on:

(a) Dynamic relocation


(b) Dynamic Loading
(c) Dynamic linking [6+4+6]

6. Make a comparison of the following disk scheduling algorithms.

(a) Shortest service time first


(b) SCAN
(c) Last in First Out
(d) FSCAN. [16]

7. (a) Compare the bitmap and hole list method of keeping track of free space on a disk with 800
cylinders, each having 5 tracks of 32 sectors. How many holes it takes before the hole list would
be larger than the bitmap? Assume that the allocation unit is the sector, and that a hole requires
a 32-bit word
(b) Make comparision of three allocation methods. [8+8]

8. (a) Discuss the password file protection mechanisms.


(b) Write a detail note on Masquerader, Misfeasor, and clandestine user. [8+8]

?????
Code No: R5410407 3
IV B.Tech I Semester(R05) Regular/Supplementary Examinations, December 2009
OPERATING SYSTEMS
(Common to Electronics & Control Engineering, Bio-Medical Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. What are the various services offered by the Operating Systems? [16]

2. Explain about traces of processes with relevant diagrams. [16]

3. What is critical section problem? Explain with example. [16]

4. Explain the solution to Dining Philosophers Problem using Monitors. [16]

5. What is memory management unit? Explain the functionality of memory management unit of a
system. [16]

6. (a) Most round-robin schedules uses a fixed size quantum. Give an argument in favor of a small
quantum. Now give an argument in favor of a large quantum. Compare and contrast the types
of systems and jobs to which the argument apply.
(b) With an example explain shortest- Process- Next scheduling. [8+8]

7. (a) Explain sequential file and indexed sequential file.


(b) Discuss access control information elements of a file directory. [8+8]

8. Write a short note on following:

(a) Trap doors


(b) Logic Bomb
(c) Trojan Horses
(d) Viruses [16]

?????
Code No: R5410407 4
IV B.Tech I Semester(R05) Regular/Supplementary Examinations, December 2009
OPERATING SYSTEMS
(Common to Electronics & Control Engineering, Bio-Medical Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. Define Real-time operating systems. Explain their importance in various applications. [16]

2. (a) What are the advantages of User Level Threads (ULTs) over (KLTs)Kernel Level Threads?
(b) What are the disadvantages of User Level Threads ULTs) over (KLTs)Kernel Level Threads?
[8+8]

3. Define monitor. What are its characteristics? [16]

4. Explain the solution to Dining Philosophers Problem using Monitors. [16]

5. (a) Explain forward- mapped page table scheme for structuring the page table.
(b) What is an inverted page table? How is it useful in structuring the page table?
[8+8]

6. Discuss how the following pairs of scheduling criteria conflict in creation settings:

(a) CPU utilization and response time.


(b) Average turn around time and maximum waiting time.
(c) I/O device utilization and CPU utilization [6+6+4]

7. (a) What is the average search time to find a record in a file less for an indexed sequential file than
for a sequential file? Explain.
(b) What is the difference between a file and a database?
(c) What are typical operations that may be performed on a directory? [6+4+6]

8. Write a short note on following:

(a) Trap doors


(b) Logic Bomb
(c) Trojan Horses
(d) Viruses [16]

?????

You might also like